-
1
-
-
0004246220
-
-
Ph.D. thesis, University of South California
-
Cohen, F.: Computer viruses. Ph.D. thesis, University of South California (1986)
-
(1986)
Computer Viruses
-
-
Cohen, F.1
-
2
-
-
0023294949
-
Computer viruses: Theory and experiments
-
1
-
Cohen F.B. (1987). Computer viruses: Theory and experiments. Comput. Secur. 6(1): 22-35
-
(1987)
Comput. Secur.
, vol.6
, pp. 22-35
-
-
Cohen, F.B.1
-
4
-
-
33947608017
-
Intrusion detection and virology: An analysis of differences, similarities and complementariness
-
Bonfante, G., Marion, J.-Y. (eds.) WTCV'06 Special Issue
-
Mé, L., Morin, B.: Intrusion detection and virology: an analysis of differences, similarities and complementariness. In: Bonfante, G., Marion, J.-Y. (eds.) J. Comput. Virol., vol. 3, no. 1, WTCV'06 Special Issue, pp. 39-49 (2007)
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.1
, pp. 39-49
-
-
Mé, L.1
Morin, B.2
-
6
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng., vol. SE-13 (1987)
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
-
-
Denning, D.1
-
7
-
-
0032639421
-
Detecting intrusion using system calls: Alternative data models
-
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusion using system calls: Alternative data models, In: Proceedings of IEEE Symposium on Security and Privacy, pp. 133-145 (1999)
-
(1999)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
10
-
-
48349143061
-
-
Fortinet observatory. http://www.fortinet.com/FortiGuardCenter/
-
-
-
-
11
-
-
84865434964
-
-
Commtouch Software Ltd
-
Malware outbreak trend report: Storm-worm, Commtouch Software Ltd (2007). http://www.commtouch.com/downloads/Storm-Worm_MOTR.pdf
-
(2007)
Malware Outbreak Trend Report: Storm-worm
-
-
-
12
-
-
33748978409
-
Malware pattern scanning schemes secure against black-box analysis
-
Broucek, V., Turner, P. (eds.) , EICAR 2006 Special Issue
-
Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. In: Broucek, V., Turner, P. (eds.) J. Comput. Virol., vol. 2, no. 1, EICAR 2006 Special Issue, pp. 35-50 (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.1
, pp. 35-50
-
-
Filiol, E.1
-
13
-
-
33751191077
-
-
Springer Heidelberg, IRIS Collection ISBN:2-287-33887-8
-
Filiol, E. (2007). Techniques Virales Avancées. Springer, Heidelberg, IRIS Collection. ISBN:2-287-33887-8
-
(2007)
Techniques Virales Avancées
-
-
Filiol, E.1
-
15
-
-
0037269111
-
Reliable identification of boundedlength viruses is np-complete
-
Spinellis D. (2003). Reliable identification of boundedlength viruses is np-complete. IEEE Trans. Inf. Theory 49: 280-284
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 280-284
-
-
Spinellis, D.1
-
16
-
-
35348995283
-
Metamorphism, formal grammars and undecidable code mutation
-
Published in the Int. J. Comput. Sci.
-
Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. In: Proceedings of the International Conference on Computational Intelligence (ICCI), Published in the Int. J. Comput. Sci., vol. 2, issue 1, pp. 70-75 (2007)
-
(2007)
Proceedings of the International Conference on Computational Intelligence (ICCI)
, vol.2
, Issue.1
, pp. 70-75
-
-
Filiol, E.1
-
17
-
-
23744485744
-
Testing malware detectors
-
ACM Press, New York
-
Christodorescu, M., Jha, S.: Testing malware detectors, In: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp. 34-44, ACM Press, New York (2004)
-
(2004)
Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)
, pp. 34-44
-
-
Christodorescu, M.1
Jha, S.2
-
18
-
-
33748929179
-
How to assess the effectiveness of your anti-virus?
-
Broucek, V. (ed.) , EICAR 2006 Special Issue
-
Josse, S.: How to assess the effectiveness of your anti-virus? In: Broucek, V. (ed.) J. Comput. Virol., vol. 2, no. 1, EICAR 2006 Special Issue, pp. 51-65 (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.1
, pp. 51-65
-
-
Josse, S.1
-
19
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
-
Bonfante, G., Marion, J.-Y. (eds.) WTCV'06 Special Issue
-
Filiol, E., Jacob, G., Liard, M.L.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. In: Bonfante, G., Marion, J.-Y. (eds.) J. Comput. Virol., vol. 3, no. 1, WTCV'06 Special Issue, pp. 23-37 (2007)
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.1
, pp. 23-37
-
-
Filiol, E.1
Jacob, G.2
Liard, M.L.3
-
20
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the detection of anomalous system call arguments. In: Proceedings of the European Symposium on Research in Computer Security, pp. 326-343 (2003)
-
(2003)
Proceedings of the European Symposium on Research in Computer Security
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
25
-
-
48349093693
-
-
Cwsandbox. Sunbelt Software. http://www.cwsandbox.org
-
Sunbelt Software
-
-
-
26
-
-
33748932391
-
Dynamic analysis of malicious code
-
Broucek, V., Turner, P., (eds.) EICAR 2006 Special Issue
-
Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. In: Broucek, V., Turner, P., (eds.) J. Comput. Virol., vol. 2, no. 1, EICAR 2006 Special Issue, pp. 67-77 (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.1
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
30
-
-
48349127005
-
Behavior blocking: The next step in anti-virus protection
-
Nachenberg, C.: Behavior blocking: The next step in anti-virus protection, SecurityFocus, 2002. http://www.securityfocus.com/infocus/1557
-
(2002)
SecurityFocus
-
-
Nachenberg, C.1
-
35
-
-
48349132266
-
Understanding heuristics: Symantec bloodhound technology
-
Tech. rep.
-
Understanding heuristics: Symantec bloodhound technology. Tech. rep., Symantec White Paper Series, vol. XXXIV (1997)
-
(1997)
Symantec White Paper Series
, vol.34
-
-
-
38
-
-
0034829697
-
A fast automaton-based approach for detecting anomalous program behaviors
-
Sekar, R., Bendre, M., Bollineni, P., Dhurjati, D.: A fast automaton-based approach for detecting anomalous program behaviors. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 144-155 (2001)
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
39
-
-
0003620778
-
-
Addison Wesley, Reading. ISBN:0-201-44124-1
-
Hopcroft, J., Motwani, R., Ullman, J.: Introduction to Automata Theory, Languages and Computation, 2nd edn. Addison Wesley, Reading (1995). ISBN:0-201-44124-1
-
(1995)
Introduction to Automata Theory, Languages and Computation, 2nd Edn.
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
40
-
-
48349147681
-
Probabilistic trees and automata for application behavior modeling
-
Mazeroff, G., Cerqueira, V.D., Gregor, J., Thomason, M.G.: Probabilistic trees and automata for application behavior modeling. In: Proceedings of the 43rd ACM Southeast Conference (2003)
-
(2003)
Proceedings of the 43rd ACM Southeast Conference
-
-
Mazeroff, G.1
Cerqueira, V.D.2
Gregor, J.3
Thomason, M.G.4
-
42
-
-
0004046658
-
-
Tech. rep., Technical Report 148, Department of Computer Science, University of Auckland
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Tech. rep., Technical Report 148, Department of Computer Science, University of Auckland (1997)
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
43
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
Kruegel, C., Robertson, W., Valeur, F., Vigna, G.: Static disassembly of obfuscated binaries. In: SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp. 18-18 (2004)
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 18-18
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
44
-
-
34547457465
-
Secure and advanced unpacking using computer emulation, extended version from the avar conference
-
3
-
Josse S. (2007). Secure and advanced unpacking using computer emulation, extended version from the avar conference. J. Comput. Virol. 3(3): 221-236
-
(2007)
J. Comput. Virol.
, vol.3
, pp. 221-236
-
-
Josse, S.1
-
45
-
-
34548223126
-
A semantic-based approach to malware detection
-
Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semantic-based approach to malware detection. In: Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL) (2007)
-
(2007)
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
46
-
-
27544433210
-
Semantic-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantic-aware malware detection. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 32-46 (2005)
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
47
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Proceedings of the Conference on the Detection of Intrusions and Malwares and Vulnerability Assessment (DIMVA), pp. 129-143 (2006)
-
(2006)
Proceedings of the Conference on the Detection of Intrusions and Malwares and Vulnerability Assessment (DIMVA)
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
48
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: International Symposium on Recent Advances in Intrusion Detection (RAID) (2005)
-
(2005)
International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
50
-
-
34047166855
-
Using code normalization for fighting self-mutating malware
-
IEEE CS Press
-
Bruschi, D., Martignoni, L., Monga, M.: Using code normalization for fighting self-mutating malware. In: Proceedings of the International Symposium on Secure Software Engineering, pp. 37-44, IEEE CS Press (2006)
-
(2006)
Proceedings of the International Symposium on Secure Software Engineering
, pp. 37-44
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
52
-
-
33751196771
-
Detection of metamorphic computer viruses using algebraic specification
-
3
-
Webster M. and Malcolm G. (2006). Detection of metamorphic computer viruses using algebraic specification. J. Comput. Virol. 2(3): 149-161
-
(2006)
J. Comput. Virol.
, vol.2
, pp. 149-161
-
-
Webster, M.1
Malcolm, G.2
-
53
-
-
34247166239
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. In: Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS) (2001)
-
(2001)
Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
54
-
-
84946414079
-
Static verification of worm and virus behavior in binary executables using model checking
-
Singh, P., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: Proceedings of the IEEE Information Assurance Workshop, pp. 298-300 (2003)
-
(2003)
Proceedings of the IEEE Information Assurance Workshop
, pp. 298-300
-
-
Singh, P.1
Lakhotia, A.2
-
56
-
-
9444298254
-
The complexity of temporal logic model checking
-
Schnoebelen P. (2003). The complexity of temporal logic model checking. Adv. Modal Logic 4: 393-436
-
(2003)
Adv. Modal Logic
, vol.4
, pp. 393-436
-
-
Schnoebelen, P.1
-
58
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
Perdisci, R., Dagon, D., Fogla, P.W.L., Sharif, M.: Misleading worm signature generators using deliberate noise injection. In: Proceedings of IEEE Symposium on Security and Privacy (2006)
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Fogla, P.W.L.3
Sharif, M.4
-
59
-
-
0002774999
-
Learning patterns from unix process execution traces for intrusion detection
-
Addison Wesley, Reading
-
Lee, W., Stolfo, S., Chan, P.: Learning patterns from unix process execution traces for intrusion detection. In: Proceedings of the AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management, pp. 50-56. Addison Wesley, Reading (1997)
-
(1997)
Proceedings of the AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
-
60
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M.G., Eskin, E., Zadok, E.: Data mining methods for detection of new malicious executables. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 38-49 (2001)
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
-
61
-
-
2342663706
-
Virus detection using data mining techniques
-
Wang, J.-H., Deng, P.S., Fan, Y.-S., Jaw, L.-J., Liu, Y.-C.: Virus detection using data mining techniques. In: Proceedings of IEEE on Security Technology, pp. 71-76 (2003)
-
(2003)
Proceedings of IEEE on Security Technology
, pp. 71-76
-
-
Wang, J.-H.1
Deng, P.S.2
Fan, Y.-S.3
Jaw, L.-J.4
Liu, Y.-C.5
-
64
-
-
85077680022
-
Behavior-based spyware detection
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based spyware detection. In: Proceedings of the 15th USENIX Security Symposium (2006)
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
66
-
-
85028593375
-
-
Avg anti-virus. Grisoft. http://www.grisoft.com/doc/39/lng/fr/tpl/tpl01
-
Avg Anti-virus
-
-
-
67
-
-
48349118762
-
-
Viguard. Softed. http://www.viguard.com/ detail_163_logiciel_antivirus_viguard-platinium#
-
Softed
-
-
-
70
-
-
48349143769
-
-
Safe′n′sec antivirus. Safen Soft. http://www.safensoft.com/ technology/
-
Safe′n′sec Antivirus
-
-
-
71
-
-
48349129326
-
-
Truprevent. Panda Software. http://www.pandasoftware.com/products/ truprevent_tec.htm?sitepanda=particulares
-
Truprevent
-
-
-
72
-
-
48349113256
-
-
Virus keeper. AxBa. http://www.viruskeeper.com/fr/faq.htm
-
AxBa
-
-
|